- --------------------------------------------------------------------------Debian Security Advisory DSA 954-1                     security@debian.org
http://www.debian.org/security/                         Moritz Muehlenhoff
January 25th, 2006                      http://www.debian.org/security/faq
- --------------------------------------------------------------------------Package        : wine
Vulnerability  : design flaw
Problem-Type   : local (remote)
Debian-specific: no
CVE ID         : CVE-2006-0106
Debian Bug     : 346197

H D Moore that discovered that Wine, a free implemention of the Microsoft
Windows APIs, inherits a design flaw from the Windows GDI API, which may
lead to the execution of code through GDI escape functions in WMF files.

The old stable distribution (woody) does not seem to be affected by this
problem.

For the stable distribution (sarge) this problem has been fixed in
version 0.0.20050310-1.2.

For the unstable distribution (sid) this problem has been fixed in
version 0.9.2-1.

We recommend that you upgrade your wine packages.


Upgrade Instructions
- --------------------wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------  Source archives:

          Size/MD5 checksum:     1321 7955ea0c5382fb0bb4649e07ed82f973
          Size/MD5 checksum:    47563 1973d7684bc3accf3c2eb1f4fa3b80be
          Size/MD5 checksum: 11798040 d90d31716ba71211af26ac773934f57e

  Architecture independent components:

          Size/MD5 checksum:  1780636 c78163bfadc872ca47b19c382f360bf2

  Intel IA-32 architecture:

          Size/MD5 checksum:  8069792 90ae35746250507071ca6e8d43d9e647
          Size/MD5 checksum:  1128766 38cee9eecc78832a9f8e83385f599d0f
          Size/MD5 checksum:  1105648 626dbf5ed914d7dfd080a826b275ebf6
          Size/MD5 checksum:  1094760 10c2c64aee60e0473c61f07de3e772f9
          Size/MD5 checksum:  2530646 7d1bc36dbb1dfa57d816ba24e135eadd
          Size/MD5 checksum:  1107820 77e61796adc46f530219502b37e0a86c
          Size/MD5 checksum:  1102382 af5ef1acdceb8ea0863abd3e6041c825
          Size/MD5 checksum:  1202416 e504f2d0cdd5f5f0187b0c44abbfdcae
          Size/MD5 checksum:  1104750 4edd3e88a7ae7f4e0dc9a42d127a1de2
          Size/MD5 checksum:  1299408 dbf86414fc89653b4d910d282733e09b
          Size/MD5 checksum:  1659130 7ba1ce62ec17663f390d8b1ea2b45d63


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp:  dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

Debian: New wine packages fix arbitrary code execution

January 27, 2006
H D Moore that discovered that Wine, a free implemention of the Microsoft Windows APIs, inherits a design flaw from the Windows GDI API, which may lead to the execution of code t...

Summary

Severity

Related News